Use-After-Free Vulnerability in libxml2's xmllint Affects Multiple Linux Distributions
CVE-2021-3516

7.8HIGH

Key Information:

Vendor

Xmlsoft

Status
Vendor
CVE Published:
1 June 2021

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2021-3516?

A significant vulnerability exists in the xmllint tool of the libxml2 library, specifically in versions prior to 2.9.11. The flaw allows an attacker to submit a specially crafted file, potentially leading to a use-after-free condition. This vulnerability compromises the confidentiality, integrity, and availability of affected systems, putting sensitive information at risk.

Affected Version(s)

libxml2 libxml2 2.9.11

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.